Department
of Computer Engineering. [U.G.] 
Subject
:-  Information and Cyber Security  [410251 ]
Semester:-
8
Subject
I/c:- Mr. Ranjit Gawande. 
Model
Ans. Paper for Information and Cyber Security 2015 Pat.
Module
-1,  Security Basics,  Credit – 1 
Syllabus
:-
Introduction, Elements of Information Security, Security Policy,
Techniques, Steps, Categories, Operational Model of Network Security,
Basic Terminologies in Network Security. Threats and Vulnerability,
Difference between Security and Privacy.
Reference
Book :- [1] Bernard
Menezes, “Network Security and Cryptography”, Cengage Learning
India, 2014, [2]
Nina
Godbole, Sunit Belapure, “Cyber Security”, Wiley India
Model Question-Based on Module -1 
Sub Topic Covered:-   Introduction, Elements of Information Security, Security Policy, Techniques, Steps, Categories,
- What are the security approaches used to implement security policy?
- How information security attacks are classified? Give Example for each
- Explain OSI or X.800 security architecture in detail.
- What are the eight security mechanisms to implement security?
- What are the various security services?
- What are the different categories of security services defined by X.800? Discuss each in detail.
- Explain the operational Model of Network Security in details
- What is cryptanalysis? Explain various cryptanalysis technique
- List the differences between Security and Privacy?
Explain
Mono-alphabetic and Poly-alphabetic ciphers with appropriate
examples.
To get the revised answer of this question  Click to download the revised answer
Matoshri College of Engineering & R. C. Nashik
Department of Computer Engineering.
MCQ Bank
 
No comments:
Post a Comment